JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)
        Home  |  About Journal  |  Editorial Board  |  Dynamic  |  Instruction  |  Subscribe  |  Advertisement  |  Contacts Us  |  中文
 
 
 
   In Press
   Current Issue
   Advanced Search
   Archive
   Read Articles
   Download Articles
Quick Search  
  Adv Search
 
2014 Vol. 49, No. 09
Published: 20 September 2014

 
 
1 Formally analyzing VMM dynamic measurement based on extended LS2
JI Xiang-min, ZHAO Bo, XIANG Shuang, XIA Zhong-lin
DOI: 10.6040/j.issn.1671-9352.2.2014.408
2014 Vol. 49 (09): 1-8 [Abstract] ( 0 ) HTML (1 KB)  PDF (1206 KB)  ( 4 )
9 SODB:a novel method for software plagiarism detection based on stack operation dynamic birthmark
FAN Ming, LIU Jun, ZHENG Qing-hua, TIAN Zhen-zhou, ZHUANG Er-yue, LIU Ting
DOI: 10.6040/j.issn.1671-9352.2.2014.123
2014 Vol. 49 (09): 9-16 [Abstract] ( 0 ) HTML (1 KB)  PDF (2097 KB)  ( 0 )
17 Research on multi-fuzzy vault algorithm based on random vaules of fingerprint characteristics
L Yang, ZHANG Gong-xuan, YANG Wen, WANG Tian-shu
DOI: 10.6040/j.issn.1671-9352.2.2014.146
2014 Vol. 49 (09): 17-23 [Abstract] ( 1 ) HTML (1 KB)  PDF (2532 KB)  ( 2 )
24 A certificateless key-insulated signature Scheme
DU Rui-ying, LIU Ya-bin, LIU Jian-dong, LUO Hui-xia
DOI: 10.6040/j.issn.1671-9352.2.2014.108
2014 Vol. 49 (09): 24-28 [Abstract] ( 0 ) HTML (1 KB)  PDF (864 KB)  ( 0 )
29 Side channel attacks in frequency domain for zuc algorithm in embedded platform
TANG Ming, GAO Jian, SUN Le-hao, QIU Zhen-long
DOI: 10.6040/j.issn.1671-9352.2.2014.259
2014 Vol. 49 (09): 29-34 [Abstract] ( 1 ) HTML (1 KB)  PDF (4991 KB)  ( 0 )
35 An alert fusion-based smart grid attack detection method
LIU Ting, ZHAO Yu-chen, LIU Yang, SUN Ya-nan
DOI: 10.6040/j.issn.1671-9352.2.2014.388
2014 Vol. 49 (09): 35-40 [Abstract] ( 0 ) HTML (1 KB)  PDF (879 KB)  ( 0 )
41 A safety verification method of compositional states based on graph transformation
DU Jun-wei, JIANG Feng, ZHANG Hui-ping, CAO Ling, YIN Wen-wen
DOI: 10.6040/j.issn.1671-9352.2.2014.139
2014 Vol. 49 (09): 41-49 [Abstract] ( 1 ) HTML (1 KB)  PDF (2505 KB)  ( 2 )
50 Optimization research of hot standy with Remus
ZOU De-qing, XIANG Jun, ZHANG Xiao-xu, YUAN Bo-yang, FENG Ming-lu
DOI: 10.6040/j.issn.1671-9352.2.2014.436
2014 Vol. 49 (09): 50-55 [Abstract] ( 0 ) HTML (1 KB)  PDF (2336 KB)  ( 0 )
56 An offline sharable mCoupons scheme based on NFC
YUAN Bian-qing, LIU Ji-qiang
DOI: 10.6040/j.issn.1671-9352.2.2014.345
2014 Vol. 49 (09): 56-61 [Abstract] ( 1 ) HTML (1 KB)  PDF (1008 KB)  ( 2 )
62 Comparative research on text knowledge discovery for network public opinion
JIAO Lu-lin, PENG Yan, LIN Yun
DOI: 10.6040/j.issn.1671-9352.2.2014.389
2014 Vol. 49 (09): 62-68 [Abstract] ( 1 ) HTML (1 KB)  PDF (2377 KB)  ( 1 )
69 A LBS privacy-preserving method for geo-fencing services
YANG Song-tao, MA Chun-guang, ZHOU Chang-li, ZHANG Zong-li
DOI: 10.6040/j.issn.1671-9352.2.2014.065
2014 Vol. 49 (09): 69-73 [Abstract] ( 0 ) HTML (1 KB)  PDF (1753 KB)  ( 0 )
74 The optimal information rate of a type of access structures based on connected hypergraphs on nine participants
ZHANG Na, LI Zhi-hui
DOI: 10.6040/j.issn.1671-9352.2.2014.181
2014 Vol. 49 (09): 74-82 [Abstract] ( 1 ) HTML (1 KB)  PDF (934 KB)  ( 4 )
83 Research of data privacy protection for cloud computing
CAI Hong-yun, TIAN Jun-feng
DOI: 10.6040/j.issn.1671-9352.2.2014.262
2014 Vol. 49 (09): 83-89 [Abstract] ( 1 ) HTML (1 KB)  PDF (976 KB)  ( 1 )
90 Detecting phishing webpage with spoofed specific features
WANG Wei-ping, ZHANG Bing
DOI: 10.6040/j.issn.1671-9352.2.2014.337
2014 Vol. 49 (09): 90-96 [Abstract] ( 1 ) HTML (1 KB)  PDF (1050 KB)  ( 0 )
97 A reputation evaluation algorithm based on transitive mode of reputation optimization in P2P system
PENG Hao, ZHAO Dan-dan, HAN Jian-min, LU Jian-feng
DOI: 10.6040/j.issn.1671-9352.2.2014.307
2014 Vol. 49 (09): 97-102 [Abstract] ( 0 ) HTML (1 KB)  PDF (1755 KB)  ( 0 )
103 Analysis of multi-factor in trust evaluation of open network
ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, ZHAI Peng, LIU Gong-zheng, ZHOU Shi-yi
DOI: 10.6040/j.issn.1671-9352.2.2014.365
2014 Vol. 49 (09): 103-108 [Abstract] ( 1 ) HTML (1 KB)  PDF (1596 KB)  ( 0 )
109 An efficient network traffic classification scheme based on similarity
DU Rui-ying, YANG Yong, CHEN Jing, WANG Chi-heng
DOI: 10.6040/j.issn.1671-9352.2.2014.106
2014 Vol. 49 (09): 109-114 [Abstract] ( 0 ) HTML (1 KB)  PDF (1402 KB)  ( 0 )
115 A cross-domain access control model of Web service based on trust measurement
YANG Xiao-hui, WANG Hong, JIANG Li-jun, CHANG Si-yuan
DOI: 10.6040/j.issn.1671-9352.2.2014.342
2014 Vol. 49 (09): 115-122 [Abstract] ( 3 ) HTML (1 KB)  PDF (1836 KB)  ( 0 )
123 A trust evaluation model based on connection number for wireless sensor networks
LI Guo-qing
DOI: 10.6040/j.issn.1671-9352.2.2014.333
2014 Vol. 49 (09): 123-128 [Abstract] ( 1 ) HTML (1 KB)  PDF (1323 KB)  ( 0 )
129 Research of the text clustering based on LDA using in network public opinion analysis
WANG Shao-peng, PENG Yan, WANG Jie
DOI: 10.6040/j.issn.1671-9352.2.2014.327
2014 Vol. 49 (09): 129-134 [Abstract] ( 3 ) HTML (1 KB)  PDF (1460 KB)  ( 0 )
135 Protection mechanism research of access control system in virtual domain
ZOU De-qing, YANG Kai, ZHANG Xiao-xu, YUAN Bo-yang, FENG Ming-lu
DOI: 10.6040/j.issn.1671-9352.2.2014.438
2014 Vol. 49 (09): 135-141 [Abstract] ( 2 ) HTML (1 KB)  PDF (2908 KB)  ( 0 )
142 A method of personalized privacy preservation based on K-anonymization
KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming
DOI: 10.6040/j.issn.1671-9352.2.2014.320
2014 Vol. 49 (09): 142-149 [Abstract] ( 0 ) HTML (1 KB)  PDF (3365 KB)  ( 0 )
150 A KNN based forensic method of Android smartphone WeChat
WU Xi-xi, LI Bing-long, ZHANG Tian-qi
DOI: 10.6040/j.issn.1671-9352.2.2014.235
2014 Vol. 49 (09): 150-153 [Abstract] ( 0 ) HTML (1 KB)  PDF (1438 KB)  ( 0 )
154 An improved hash-based RFID security authentication algorithm
WANG Xu-yu, JING Feng-xuan, WANG Yu-qing
DOI: 10.6040/j.issn.1671-9352.2.2014.133
2014 Vol. 49 (09): 154-159 [Abstract] ( 1 ) HTML (1 KB)  PDF (1751 KB)  ( 2 )
160 An efficient multiple-replica data possession checking scheme
LIU Wen-zhuo, CAO Tian-jie, HUANG Shi
DOI: 10.6040/j.issn.1671-9352.2.2014.183
2014 Vol. 49 (09): 160-165 [Abstract] ( 0 ) HTML (1 KB)  PDF (1255 KB)  ( 0 )
166 Symmetry detection of point-based 3D models algorithm based on weighted PCA
WANG Lei, HE Chen, XIE Jiang-ning
DOI: 10.6040/j.issn.1671-9352.0.2014.271
2014 Vol. 49 (09): 166-170 [Abstract] ( 0 ) HTML (1 KB)  PDF (1273 KB)  ( 0 )
山东大学学报(理学版)
 
More>>   
 
More>>   
More>>   
Copyright © Editorial Board of JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)
Supported by:Beijing Magtech